How Would A CIO Handle Security  Case Study

PAGES
3
WORDS
1008
Cite

Network Security The Key Requirements of Network Infrastructure Security

Measures for Internal Network Architecture

Storage of sensitive information on Networked Systems

Network Connection Control

Administrative Services

Visitor access

Third Party Access to Internal Networks

Security of the IT network for any company is very important. Scores of sensitive business information is stored electronically in the IT systems and the company network. An unsecured or a partially secured network has the potential to cause financial losses to the company if the information falls in the wrong hands. Therefore there is need for installing and network security systems.

For any network security to become operational the company must first look into whether the system can be implemented technically and whether it can be implemented throughout the organization. Another consideration for the selection of the network security is to ensure that the system clearly define areas of responsibility for the users, administrators, and management and is flexible and adaptable to the changing environments (Andre-s, 2004).

Thesis statement: it is critical that the company assess, chooses and implements and appropriate network security system to protect data, especially the sensitive ones.

The Key Requirements of Network Infrastructure Security

A security system must ensure that the following network infrastructure security principles are met:

1) Allows secure configuration and accessed in a secure fashion of the network devices

2) Network communications use secure protocols

3) Demilitarized zones or DMZs and control devices such as securely configured firewalls or router Access Control Lists needs...

...

These include issues like the direction of the connection to the network service, deciding on the sensitivity of data flowing over the connection to the network service and encrypting o sensitive data and the inbound and outbound network services should be approved and documented (Andre-s, 2004).
Storage of sensitive information on Networked Systems

It is suggested that sensitive information like financial information and non-public research data should not be stored in systems that have access to outside network systems like the internet. Such data should be kept safe and away from directly accessible from external hostile networks. The servers and the data base that would store the sensitive information should not be connected to the internet network system and limited coded access should be given to only those people who are authorized to access the information from within the organization (Heng, Wright & Goi, 2010). Separate security zones need to be created for sensitive information of the organization.

Network Connection Control

Restrictions should be…

Sources Used in Documents:

References

Andres, S. (2004). Security sage's guide to hardening the network infrastructure. Rockland, MA: Syngress Pub.

Convery, S. (2004). Network security architectures. Indianapolis, IN: Cisco Press.

Heng, S., Wright, R., & Goi, B. (2010). Cryptology and network security. Berlin: Springer.

1 | Page


Cite this Document:

"How Would A CIO Handle Security " (2015, July 23) Retrieved April 27, 2024, from
https://www.paperdue.com/essay/how-would-a-cio-handle-security-2152100

"How Would A CIO Handle Security " 23 July 2015. Web.27 April. 2024. <
https://www.paperdue.com/essay/how-would-a-cio-handle-security-2152100>

"How Would A CIO Handle Security ", 23 July 2015, Accessed.27 April. 2024,
https://www.paperdue.com/essay/how-would-a-cio-handle-security-2152100

Related Documents

Despite these concerns however the world's largest companies still actively promote and routinely hype the value of cloud computing without mentioning the myriad of risk associated with this platform, despite its continual maturation from a security and stability standpoint [2]. An example of this is type of hype is when Microsoft's Steve Balmer described cloud computing as the next frontier and Dr. Ajei Gopal verified that the cloud is there

CIO Magazine Analysis Critical Evaluation of the CIO Magazine Article The Whole . . . is More than its Parts The article The Whole . . . is More than its Parts illustrates the complexities, challenges and decisions that must be made in order for an enterprise to unify its many applications, databases, systems and platforms to serve a common strategic purpose. The article was published May 31, 2000 when integration options within

SECURITY and PRIVACY - the following security and privacy requirements apply: The Office does not accept responsibility for the privacy, confidentiality or security of data or information not generated by this office or transmitted from external sources into the system. The Office does not accept responsibility for loss, corruption, misdirection or delays in transmission of personal data through the system. Users are responsible for the integrity of all data and

security and governance program is "a set of responsibilities and practices that is the responsibility of the Board and the senior executives." This is the procedures by which the company ensures information security in the organization. The program consists of desired outcomes, knowledge of the information assets, and process integration (ITGI, 2013). Security of information is important because of the value of information, especially proprietary, in today's business world.

Data Privacy and Security
PAGES 5 WORDS 2026

Security Management Plan John's Hospital Privacy of client information is an assurance that every patient wants and this assurance is what the hospital can build patient confidence on. The lack of it therefore may have consequences such as loss of confidence in the hospital, loss of clientele and the emergence of a poor reputation. This paper looks at the St. John's Hospital which has experienced the leakage of confidential information a problem

Computer Security People, process and technology are three things which are involved in information security. Biometrics, passwords and firewalls are some of the technical measures and these are not enough in justifying threats to information. In order to protect information from destruction and to secure systems, a blend of different procedures is required. While deploying information security some factors need to be considered for instance processes like de-registration and registration